Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Why you should create a security.txt file if you have a VDP or bug bounty program
Security Compliance, Vulnerability Management

What Is a Security.txt File and How Can It Help Your Program?

Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure policy and contact information in a...

Why you should create a security.txt file if you have a VDP or bug bounty program
Security Compliance, Vulnerability Management

What Is a Security.txt File and How Can It Help Your Program?

Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure...
pullrequest5ways
Application Security

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project

Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...

HackerOne Blog
Assessments, Penetration Testing

HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch

This improved experience reduces time to launch, which is vital when your organization is up against an urgent...
PubvsPri
Vulnerability Management

Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs

How Are Bug Bounty Programs and Vulnerability Disclosure Programs Different? Let’s start with the similarities...
What is Attack Resistance Management (ARM) (ASM)
Company News

What is Attack Resistance Management?

A Security Survey on How to Close Your Organization's Attack Resistance Gap

HackerOne announces PullRequest acquisition
Company News, Application Security

Why HackerOne Acquired Pull Request and What It Means to Our Customers

Security vulnerabilities are a significant workflow disruption when discovered near the end of development...
Stock image
Vulnerability Disclosure, Customer Stories, Response

Announcing the Results of the 12-month DIB-VDP Pilot

When the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) 12-month Pilot concluded, HackerOne sat down with the pilot's collaborating agencies and the ethical hackers who worked on the pilot. The discussion centered on pilot results, the most exciting vulnerabilities that surfaced, and learning why the federal government continues to engage hackers to secure the digital assets of the United States government.
How Wix Uses HackerOne to Improve Their Cybersecurity Posture
Customer Stories, Application Security, Best Practices, Bounty, Vulnerability Management

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...